There is good and bad news around cybersecurity these days. The good news is that many CEOs and corporate boards no longer accept “good enough” security, and are willing to invest in best practices and leading security defenses to protect their organizations. So what’s the bad news? Many organizations continue to think of cyber-risk in terms of internal network penetration rather than as a more comprehensive strategy that includes all digital assets - websites, social networks, VIP and third-party partner exposure, etc. To address these risks, CISOs and risk officers must adopt a thorough digital risk management strategy that includes monitoring, filtering, prioritizing, and responding to threats across the public Internet and dark web. Digital Shadows specializes in this area and can help organizations with digital risk mitigation.
6 Considerations When Purchasing Threat Intelligence
When selecting the optimal Cyber Threat Intelligence solution for your organization, use this guide to asse...
Error - something went wrong!
Other content in this Stream
Digital Risk Protection: Forrester New Wave Report
Digital Shadows Named a "Leader" in 2018 Forrester New Wave for Digital Risk Protection
yOurMine, Equifax Indictment, and SWIFT POC attack
Roses are red, violets are blue, here’s our threat intel podcast, just for you!
Weekly Intelligence Summary 14 Feb 2020
A recently discovered campaign has used the legitimate storage services of BitBucket to facilitate malware distribution and increase the perceived trust between an unknown threat actor and a targeted
Applying the Analysis of Competing Hypotheses to the Cyber Domain
We define the strengths and weaknesses of ACH in the cyber-threat domain, with a "customer-centric" view that can aid analysts in presenting intelligence to a decision maker.
Dark web travel agencies: Take a trip on the dark side
This blog is intended to highlight the flourishing scene on criminal marketplaces for airline-related information.
Threat Report ATT&CK Mapping (TRAM) With MITRE’s Sarah Yoder And Jackie Lasky
Sarah Yoder and Jackie Lasky from MITRE join Rick Holland and Harrison Van Riper in this guest episode to talk through their tool, Threat Report ATT&CK Mapping (TRAM). Both Sarah and Jackie are...
Competitions on Russian-language cybercriminal forums: Sharing expertise or threat actor showboating?
Competitions have been a feature of the Russian-language cybercriminal scene practically since the advent of cybercriminal forums ...
CTI Frameworks, Wawa Breach Updates, APT34, And Coronavirus Phishing Scams
January was a looooong year. Anyone else? In this week’s episode, Jamie starts by talking about his recent blog, Cyber Threat Intelligence Frameworks, with 5 rules for integrating these frameworks...
How to Operationalize Threat Intelligence: Actionability and Context
Is there real value in threat intelligence? How can we leverage threat intelligence and make use of it in any meaningful way?
Red Team Blues: A 10 step security program for Windows Active Directory environments
Here at Digital Shadows we spend quite a bit of time attacking, defending and researching Windows AD environments, so we thought we’d chip in with a list of controls that we have found to give ...
SANS CTI Summit, Snake Ransomware, CacheOut, And Citrix Vuln Update [Podcast]
Rick Holland jumps in to kick-off this week’s episode to recap the 2020 SANS CTI Summit with Harrison. Then Harrison, Alex, Kacey, and Charles talk through other top stories of the week.
Cyber Threat Intelligence Frameworks: 5 Rules for Integrating These Frameworks
This blog discusses how different CTI frameworks can co-exist, and suggests some practical rules to bear in mind when integrating these frameworks into intelligence practices.
How the Cybercriminal Underground Mirrors the Real World
In many cases the cybercriminal underground is a lot more familiar than you might be led to believe...
How Digital Shadows Helped Find and Remediate an Exposed Admin Password on Github
In this blog series, we’ll share some tales from the front lines – keeping client names anonymous, of course. We’ll investigate some of SearchLight’s most impactful findings, and more importantly, she
CVE-2019-19781: Analyzing the Exploit
On December 17th 2019, CVE-2019-19781 was disclosed. The vulnerability allows for directory traversal and remote code execution on Citrix ...
Iranian Cyber Threats: Practical Advice for Security Professionals
Unless you went very dark for an extended holiday break, you are no doubt very well aware of the United ...
Third Party Risk: 4 ways to manage your security ecosystem
The digital economy has multiplied the number of suppliers that organizations work and interact with. Using a supplier can ...
Iran and the United States – start of the long war or return to normal?
There are useful precedents that can assist when we consider how this will unfold in the near-term future.
2020 Cybersecurity Forecasts: 5 trends and predictions for the new year
In this blog, we discuss several significant trends and events that have helped shape the cyber threat landscape, all of which will almost certainly continue through 2020.
Iranian Cyber Threats: Practical Advice From CISO Rick Holland